Mittwoch, 30. April 2008

Congratulations to our U.S. and Canadian Anita Borg Scholars



In 2003 we established the Anita Borg Memorial Scholarship to honor the work of Dr. Anita Borg, a computer scientist who dedicated her professional career to increasing the participation of women and other under-represented minorities in the field of technology. In her memory, we're pleased to announce the fifth class of Anita Borg Scholars in the U.S., and our first class of scholars in Canada.

The U.S. program awards $10,000 academic scholarships to 23 outstanding female leaders in technology, and $1,000 scholarships to 32 finalists. In Canada, 4 women will receive $5,000 scholarship awards, and 13 finalists will receive $1,000 scholarships. These undergraduate and graduate women are completing degrees in computer science and related fields. Each of these award recipients has demonstrated a commitment to advancing women in technology. We congratulate these leaders on their accomplishments.

The U.S. scholars and finalists recently visited the Googleplex in Mountain View, CA as part of the annual all-expenses-paid Google Scholars' Retreat. Students attended technical workshops and discussions with Google engineers and executives, and heard first-hand about the life and work of Anita Borg from Telle Whitney, President of the Anita Borg Institute for Women in Technology. The retreat enables these scholars to meet each other and create a network of future leaders in computer science. The 2008 recipients of the Google United Negro College Fund Scholarship and Hispanic College Fund Scholarship also attended.

The 17 Canada Anita Borg Scholars and Finalists will attend a Scholars' Retreat for their inaugural class this Thursday and Friday at our engineering office in New York.

Visit our scholarships page to learn more about our programs. The Anita Borg Memorial Scholarship is also available to female computer science students in Europe, Australia and New Zealand.

The 2008 Anita Borg Scholars ($10,000 winners)
  • Allison Park Heath - Rice University, PhD Computer Science
  • Amy Hurst - Carnegie Mellon University, Ph Human Computer Interaction
  • Betsy Nora DiSalvo - Georgia Institute of Technology, PhD Human Centered Computing
  • Diane Marie Budzik - University of California, Los Angeles, PhD Electrical Engineering
  • Elizabeth Arrowsmith Bales - University of California, San Diego, PhD Computer Science
  • Emily Anne Fortuna -Rice University, B.S. Computer Science
  • Erika Shehan Poole - Georgia Institute of Technology, PhD Human Centered Computing
  • Gabriela Marcu - University of California, Irvine, B.S. Informatics
  • Ghinwa Fakhri Choueiter - Massachusetts Institute of Technology, PhD Electrical Engineering & Computer Science
  • Gina-Maria Pomann - The College of New Jersey, B.A. Math
  • Jennifer C. Stoll - Georgia Institute of Technology, PhD Human Centered Computing
  • Jennifer Denise Tam - Carnegie Mellon University, PhD Computer Science
  • Jill Patrice Dimond - Georgia Institute of Technology, PhD Human Centered Computing
  • Julie Maureen Letchner - University of Washington, PhD Computer Science
  • Katherine Mary Everitt - University of Washington, PhD Computer Science
  • Nancy Dougherty - Stanford University, B.S. Electrical Engineering Raluca Ada Popa - Massachusetts Institute of Technology, B.S. Computer Science
  • Sally Kadry Wahba - Clemson University, PhD Computer Science
  • Sarita Ann Yardi - Georgia Institute of Technology, PhD Human Centered Computing
  • Silvia Lindtner - University of California, Irvine, PhD Information & Computer Science
  • Svetlana Yarosh - Georgia Institute of Technology, PhD Human Centered Computing
  • Tammara Massey - University of California, Los Angeles, PhD Computer Science
  • Yvon Hall Feaster - Clemson University, B.S. Computer Information Systems
The 2008 Anita Borg Finalists ($1,000 winners)
  • Aditi Suhas Pendharkar - Carnegie Mellon University, M.S. Information Networking
  • Alokika Dash - Univeristy of California, Irvine, PhD Electrical Engineering & Computer Science
  • Ashley Leonora Podhradsky
  • Dakota State University, PhD Information Systems
  • Carla Mae Webb - Western Illinois University, B.S. Computer Science & Math
  • Christina Marie Williams - Colorado State University, B.S. Computer Science
  • Devorah Gurwitz - Touro College, B.S. Computer Science
  • Eakta Jain - Carnegie Mellon University, PhD Robotics
  • Elena Jocelyn Jakubiak - Tufts University, PhD Computer Science
  • Geeta Sharad Shroff - Carnegie Mellon University, B.S. Computer Science
  • Jessica Lee Heier - Georgia Institute of Technology, PhD Industrial & Systems Engineering
  • Karen Edwards Works - Worcester Polytechnic Institute, PhD Computer Science
  • Kathy Tran Pham - Georgia Institute of Technology, M.S.Computer Science
  • Kimber Diane Lockhart - Stanford University, B.Eng. Computer Science
  • Kriti Rameshlal Puniyani - Carnegie Mellon University, PhD Computer Science
  • Liangrong Yi - University of Kentucky, PhD Computer Science
  • Lisa Deanne Brown - Carnegie Mellon University, M.A. Entertainment Technology
  • Lisa Marie White - University of Notre Dame, B.Eng. Computer Science
  • Lisa Minerva Tolentino - Arizona State University, PhD Media Arts & Computer Science
  • Meghan Katheleen Revelle - The College of William and Mary, PhD Computer Science
  • Nahid Mahfuza Alam - Clemson University, PhD Computer Engineering
  • Ramya Raghavendra - University of California, Santa Barbara, PhD Computer Science
  • Rashida Zalika Davis - University of Delaware, PhD Computer & Information Sciences
  • Renuka Ajay Apte - Georgia Institute of Technology, M.S. Computer Science
  • Ruth Lorraine Wylie - Carnegie Mellon University, PhD Human-Computer Interaction
  • Sara Gatmir Motahari - New Jersey Institute of Technology, PhD Electrical & Computer Engineering
  • Sofia Jeon - Drexel University, PhD Computer Science
  • Sonya Stoyanova Nikolova - Princeton University, PhD Computer Science
  • Stiliyana Boycheva Stamenova - Macalester College, B.A. Math & Computer Science
  • Tasneem Kaochar - University of Arizona, B.S. Computer Science
  • Valerie Henderson Summet - Georgia Institute of Technology, PhD Human Centered Computing
  • Vibha Laljani - California Institute of Technology, B.S. Computer Science
  • Yi Mao - Purdue University, PhD Electrical & Computer Engineering
The 2008 Canada Anita Borg Scholars ($5,000 CAD Winners)
  • Angelica Lim - Simon Fraser University, BSc Computer Science
  • Celina Gibbs - University of Victoria, MSc Computer Science
  • Christina Boucher - University of Waterloo, PhD Computer Science
  • Mireille Gomes - Queens University, BCompH Biomedical Computing
The 2008 Canada Anita Borg Finalists ($1,000 CAD Winners)
  • Alma Juarez-Domiguez - University of Waterloo, PhD Computer Science
  • April Khademi - University of Toronto, PhD Electrical Engineering
  • Carrie Demmans - University of Saskatchewan, MSc Computer Science
  • Cristina Ribeiro - University of Guelph, MSc Computer Science
    Gail Carmichael - Carleton University, MSc Computer Science
  • Georgia Kastidou - University of Waterloo, PhD Computer Science
  • Jocelyn Simmonds - University of Toronto, PhD Computer Science
  • Katelyn Kent - University of New Brunswick, BSc Computer Engineering
  • Ming Hua - Simon Fraser University, PhD Computer Science
  • Pooja Viswanathan - University of British Columbia, PhD Computer Science
  • Terri Oda - Carleton University, PhD in Computer Science
  • Thuy Vu - University of Toronto, BSc Computer Science
  • Viann Chan - University of British Columbia, PhD Computer Science


Where art thou?



Did you notice the chrome tulips on Google's homepage today? They are part of a special Google doodle done by renowned artist Jeff Koons. And that isn't the only art appearing anew on Google today. As part of our iGoogle Artists project, we have collaborated with almost 70 artists in 17 countries on 6 continents to create special iGoogle themes -- works of art that appeal to all ages and interests. Artists, designers and other notables involved include Jeff Koons, Dale Chihuly, Coldplay, Diane von Furstenberg, Dolce&Gabbana, Yann Arthus-Bertrand, Michael Graves, Phillipe Starck, Bob Mankoff, Mark Morris, Oscar de la Renta, Anne Geddes and Tory Burch. While the list of those who have contributed themes is impressive (I've only listed 1/5th(!) of the artists here), even more impressive is the art itself - it's spectacularly beautiful!

Until now, iGoogle has been about getting the content you want on your homepage. The iGoogle artist themes take personalization to the next level -- allowing you to select world-class art that really reflects their personality for their pages. It's what happens when great art meets technology.

As part of our launch, we will be holding an outdoor art gallery this weekend in New York's Meatpacking District, where on Thursday, Friday, and Saturday nights the art from the iGoogle artists project will be projected on the buildings, sidewalks, and streets. This is a map of where you can find the display. We will post video of the event on YouTube.

Check it out - the art speaks for itself - select your iGoogle artist theme today at www.google.com/artistthemes!


Dienstag, 29. April 2008

How to avoid getting hooked



This post is one of a series devoted to online security. - Ed.


Millions of people have gotten "urgent" emails asking them to take immediate action to prevent some impending disaster. "Our bank has a new security system. Update your information now or you won't be able to access your account," or "We couldn't verify your information; click here to update your account." Sometimes the email claims that something awful will happen to the sender (or a third party), as in "The sum of $30,000,000 is going to go to the Government unless you help me transfer it to your bank account."

People who click on the links in these emails may see a web page that looks like a legitimate site they've visited before. Because the page looks familiar, these people enter their username, password, or other private information on the site. What they've actually done is given an unknown third party all the information needed to hijack their account, steal their money, or open up new lines of credit in their name. They just fell for a phishing attack.

The concept behind such an attack is pretty simple: Someone masquerades as someone else in an effort to fool you into sharing personal or other sensitive information with them. Phishers can masquerade as just about anyone, including banks, email and application providers, online merchants, online payment services, and even governments. And while some of these attacks are crude and easy to spot, many of them are sophisticated and well constructed. That fake email from "your bank" can look very real; the bogus "login page" you're redirected to can seem completely legitimate.

The good news is there are things you can do to steer clear of phishing attacks:
  • Be careful about responding to emails that ask you for sensitive information. You should be wary of clicking on links in emails or responding to emails that are asking for things like account numbers, user names and passwords, or other personal information such as social security numbers. Most legitimate businesses will never ask for this information via email. Google doesn't.
  • Go to the site yourself, rather than clicking on links in suspicious emails. If you receive a communication asking for sensitive information but think it could be legitimate, open a new browser window and go to the organization's website as you normally would (for instance, by using a bookmark or by typing out the address of the organization's website). This will improve the chances that you're dealing with the organization's website rather than with a phisher's website, and if there's actually something you need to do, there will usually be a notification on the site. Also, if you're not sure about a request you've received, don't be afraid to contact the organization directly to ask. It takes just a few minutes to go to the organization's website, find an email address or phone number for customer support, and reach out to confirm whether the request is legitimate.
  • If you're on a site that's asking you to enter sensitive information, check for signs of anything suspicious. If you're on a site that's asking for sensitive information -- no matter how you got there -- check for the signs that it's really the official website for the organization. For example, check the URL to make sure the page is actually part of the organization's website, and not a fraudulent page on a different domain (such as mybankk.com or g00gle.com.) If you're on a page that should be secured (like one asking you to enter in your credit card information) look for "https" at the beginning of the URL and the padlock icon in the browser. (In Firefox and Internet Explorer 6, the padlock appears in the bottom right-hand corner, while in Internet Explorer 7 the padlock appears on the right-hand side of the address bar.) These signs aren't infallible, but they're a good place to start.
  • Be wary of the "fabulous offers" and "fantastic prizes" that you'll sometimes come across on the web. If something seems too good to be true, it probably is, and it could be a phisher trying to steal your information. Whenever you come across an offer online that requires you to share personal or other sensitive information to take advantage of it, be sure to ask lots of questions and check the site asking for your information for signs of anything suspicious.
  • Use a browser that has a phishing filter. The latest versions of most browsers -- including Firefox, Internet Explorer, and Opera -- include phishing filters that can help you spot potential phishing attacks.
All fairly simple, right? What it all comes down to is if someone asks you to share personal or other sensitive information online, take a moment to think through the request carefully. Doing so will help you stay safe online, and help us all put phishers out of business.